DOI QR코드

DOI QR Code

A Study on Lightweight Block Cryptographic Algorithm Applicable to IoT Environment

IoT 환경에 적용 가능한 경량화 블록 암호알고리즘에 관한 연구

  • Lee, Seon-Keun (School of Mechanical System Engineering, Chonbuk National University)
  • 이선근 (전북대학교 기계시스템공학부)
  • Received : 2017.11.06
  • Accepted : 2018.03.09
  • Published : 2018.03.31

Abstract

The IoT environment provides an infinite variety of services using many different devices and networks. The development of the IoT environment is directly proportional to the level of security that can be provided. In some ways, lightweight cryptography is suitable for IoT environments, because it provides security, higher throughput, low power consumption and compactness. However, it has the limitation that it must form a new cryptosystem and be used within a limited resource range. Therefore, it is not the best solution for the IoT environment that requires diversification. Therefore, in order to overcome these disadvantages, this paper proposes a method suitable for the IoT environment, while using the existing block cipher algorithm, viz. the lightweight cipher algorithm, and keeping the existing system (viz. the sensing part and the server) almost unchanged. The proposed BCL architecture can perform encryption for various sensor devices in existing wire/wireless USNs (using) lightweight encryption. The proposed BCL architecture includes a pre/post-processing part in the existing block cipher algorithm, which allows various scattered devices to operate in a daisy chain network environment. This characteristic is optimal for the information security of distributed sensor systems and does not affect the neighboring network environment, even if hacking and cracking occur. Therefore, the BCL architecture proposed in the IoT environment can provide an optimal solution for the diversified IoT environment, because the existing block cryptographic algorithm, viz. the lightweight cryptographic algorithm, can be used.

IoT 환경은 다양한 디바이스들과 네트워크를 이용하여 무한대의 서비스를 제공한다. 이러한 IoT 환경 발전은 비례적으로 보안의 중요성과 직결된다. 경량 암호는 보안, 높은 처리량, 낮은 전력 소비 및 소형을 제공하는 분야이기 때문에 IoT 환경에 적합하다. 그러나 경량 암호는 새로운 암호 체계를 형성해야 하고, 제한된 리소스 범위 내에서 활용되야 한다는 문제점을 가지고 있다. 그러므로 경량 암호는 다변화/다양화 등을 요구하는 IoT 환경에 최적의 솔루션이라고 단언할 수 없다. 그러므로 이러한 단점들을 없애기 위하여, 본 논문은 기존 블록 암호알고리즘을 경량화 암호알고리즘과 같이 사용할 수 있고, 기존 시스템(센싱부와 서버와 같은)을 거의 그대로 유지하면서 IoT 환경에 적합한 방법을 제안한다. 제안된 BCL 구조는 기존 유무선 센서 네트워크에서 다양한 센서 디바이스들에 대한 암호화를 경량 암호화 같이 수행할 수 있도록 한다. 제안된 BCL 구조는 기존 블록 암호알고리즘에 전/후처리부를 포함한다. BCL 전/후처리부는 흩어져 있는 각종 디바이스들을 데이지 체인 네트워크 환경에서 동작하도록 하였다. 이러한 특징은 분산된 센서시스템의 정보보호에 최적이며 해킹 및 크래킹이 발생하더라도 인접 네트워크 환경에 영향을 미치지 못한다. 그러므로 IoT 환경에서 제안된 BCL 구조는 기존 블록암호알고리즘을 경량화 암호알고리즘과 같이 사용할 수 있기 때문에 다변화되는 IoT 환경에 최적의 솔루션을 제공할 수 있다.

Keywords

References

  1. CISCO, "IoT", https://www.cisco.com/c/en/us/solutions/internet-of-things/overview.html#-stickynav=1(accessed Jan., 10, 2017)
  2. Microsoft, "iot", https://www.microsoft.com/en-us/internet-of-things/(accessed Feb., 13, 2017)
  3. IBM, "iot", https://www.ibm.com/internet-of-things/ (accessed Feb., 13, 2017)
  4. Ye, J., Dobson, S., McKeever, S., "Situation identification techniques in pervasive computing", Pervasive and Mobile Computing, vol. 8, no. 1, pp. 36-66, Feb. 2012. DOI: https://doi.org/10.1016/j.pmcj.2011.01.004
  5. S.D.T. Kelly, N.K. Suryadevara, S.C. Mukhopadhyay, "Towards the Implementation of IoT for Environmental Condition Monitoring in Homes", IEEE Sensors Journal, vol. 13, no. 10, 2013. DOI: https://doi.org/10.1109/JSEN.2013.2263379
  6. Tapalina Bhattasali, Khalid Saeed, Nabendu Chaki, Rituparna Chaki, "A Survey of Security and Privacy Issues for Biometrics Based Remote Authentication in Cloud", IFIP International Conference on Computer Information Systems and Industrial Management CISIM 2014, pp. 112-121, 2014. DOI: https://doi.org/10.1007/978-3-662-45237-0_12
  7. Lightweight Cryptography definition, https://www.cryptolux.org/index.php/Lightweight_Cryptography(accessed Aug., 03, 2017)
  8. NIST, Lightweight Cryptography, https://www.nist.gov/programs-projects/lightweight-cryptography(accessed Aug., 17, 2017)
  9. Z. Shi and R. B. Lee, "Bit permutation instructions for accelerating software cryptography," In Proceedings of the IEEE International Conference on Application Specific Systems, Architectures and Processors (ASAP 2000), pp. 138-148, July 2000. DOI: https://doi.org/10.1109/ASAP.2000.862385
  10. J. Guo, I. Nikolic, T. Peyrin, and L. Wang, "ryptanalysis of Zorro," In IACR Cryptology ePrint Archive, 2013, 713.
  11. Eli Biham. "Serpent: A New Block Cipher Proposal", Lecture Notes in Computer Science, 1998. DOI: https://doi.org/10.1007/3-540-69710-1_15
  12. Mansoor Ebrahim, Shujaat Khan, Umer Bin Khalid, "Symmetric Algorithm Survey: A Comparative Analysis", International Journal of Computer Applications (0975-8887), vol. 61, no. 20, Jan. 2013.
  13. Serpent, http://www.cl.cam.ac.uk/-rja14/serpent.html
  14. AJ Elbirt, C Paar, "An FPGA Implementation and Performance Evaluation of the Serpent Block Cipher", Field-Programmable Gate Arrays, International ACM Symposium on (2000), pp. 33-40, Feb. 11, 2000. DOI: https://doi.org/10.1145/329166.329176